-
181
Deep packet inspection oriented high speed packet parsing architecture
Published 2013-06-01Subjects: Get full text
Article -
182
SDN Communication Quality Assurance Strategy witb DDoS Defense and Routing Optimization
Published 2015-04-01Subjects: Get full text
Article -
183
Secure software development: leveraging application call graphs to detect security vulnerabilities
Published 2025-01-01Subjects: “…Network security…”
Get full text
Article -
184
Detecting malicious domain names based on AGD
Published 2018-07-01Subjects: “…network security monitoring…”
Get full text
Article -
185
Research on network attack analysis method based on attack graph of absorbing Markov chain
Published 2023-02-01Subjects: Get full text
Article -
186
A Defense Approach of DAD Attack in Stateless Auto Configuration
Published 2014-04-01Subjects: “…network security…”
Get full text
Article -
187
Application protection in 5G cloud network using zero trust architecture
Published 2020-12-01Subjects: “…network security…”
Get full text
Article -
188
Challenges and key technologies of new Ethernet for intelligent computing center
Published 2024-06-01Subjects: Get full text
Article -
189
Optimal strategy selection method for moving target defense based on signaling game
Published 2019-06-01Subjects: “…network security…”
Get full text
Article -
190
L2/L3 equipment deployment scheme in PTN network architecture
Published 2017-06-01Subjects: Get full text
Article -
191
Text analysis of DNS queries for data exfiltration protection of computer networks
Published 2020-09-01Subjects: Get full text
Article -
192
New data fusion model of intrusion detection——IDSFP
Published 2006-01-01Subjects: “…network security…”
Get full text
Article -
193
-
194
New approach against Sybil attack in wireless sensor networks
Published 2008-01-01Subjects: “…wireless networks security…”
Get full text
Article -
195
Multi-objective optimization placement strategy for SDN security controller considering Byzantine attributes
Published 2021-06-01Subjects: “…software defined network security…”
Get full text
Article -
196
Models and scenarios of implementation of threats for internet resources
Published 2020-12-01Subjects: “…computer and network security…”
Get full text
Article -
197
Some critical issues of content sharing network
Published 2016-10-01Subjects: Get full text
Article -
198
Development trends of information and communication technology
Published 2024-04-01Subjects: Get full text
Article -
199
A Control-Theoretical Zero-Knowledge Proof Scheme for Networked Control Systems
Published 2024-01-01Subjects: “…Computer/network security…”
Get full text
Article -
200
Survey on intellectual property protection for deep learning model
Published 2022-04-01Subjects: “…neural network security…”
Get full text
Article